Multiple Choice
Pretexting is best described as a social engineering technique that uses
A) text messages to gain sensitive information.
B) an invented scenario to gain sensitive information.
C) threat of physical force to gain sensitive information.
D) impersonation of somebody you know to gain sensitive information.
Correct Answer:

Verified
Correct Answer:
Verified
Q1: Individuals who buy the malware are referred
Q3: Which of the following is not an
Q4: Listening to private voice or data transmissions
Q5: Jim Cooper decided to do some Christmas
Q6: After graduating from college,Rob Johnson experienced some
Q7: Executable code that attaches itself to software,replicates
Q8: Zeus is an example of a<br>A)virus.<br>B)worm.<br>C)Trojan horse.<br>D)war
Q9: Developers of computer systems often include a
Q10: _ consists of the unauthorized copying of
Q11: Ashley Baker has been the webmaster for